Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for detecting vulnerabilities of IP multimedia subsystem

A multimedia subsystem and vulnerability detection technology, applied in transmission systems, digital transmission systems, electrical components, etc., can solve the problems of increased security vulnerabilities, signaling integrity, confidentiality, usability and authenticity, and the quality of developers. Unevenness and other problems, to achieve the effect of security

Inactive Publication Date: 2013-12-18
BEIJING UNIV OF POSTS & TELECOMM
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the SIP protocol has the characteristics of ease of use, flexibility, and strong scalability, because the SIP protocol is generally transmitted on the IP network in text mode, and the transmission of the SIP protocol uses intermediate devices such as proxy servers and redirection servers, making it There are security risks in the integrity, confidentiality, availability and authenticity of signaling
In addition, in the process of transforming the SIP protocol into products, due to the uneven quality of developers and the lack of maintenance of products developed by the SIP standard for a long time, some security vulnerabilities will be virtually added

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for detecting vulnerabilities of IP multimedia subsystem
  • Method and system for detecting vulnerabilities of IP multimedia subsystem
  • Method and system for detecting vulnerabilities of IP multimedia subsystem

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The basic idea of ​​the present invention is: construct the malformed SIP signaling of IMS according to the SIP signaling specification and characteristics, and set the threat dimension and detection strategy of the malformed SIP signaling, and select according to the detection strategy selected by the user and the threat dimension of the malformed SIP signaling The malformed SIP signaling is sent to the IMS. After the transmission is completed, the network status of the IMS is detected and a detection report is generated to realize the vulnerability detection of the IMS.

[0049] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail by citing the following embodiments and referring to the accompanying drawings.

[0050] figure 1 Shows the implementation flow of the IMS vulnerability detection method of the present invention, as figure 1 Shown, the method that the prese...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and a system for detecting vulnerabilities of an IP multimedia subsystem. The method comprises the following steps of: constructing an anamorphic SIP signaling of the IP multimedia subsystem (IMS), and setting the threat dimension of the anamorphic SIP signaling; setting a detection strategy of the IMS according to user requirements and the anamorphic SIP signaling; selecting the anamorphic SIP signaling and sending the anamorphic SIP signaling to the IMS according to the detection strategy and a test scheme selected by a user; and detecting the network state of the IMS and generating a detection report. By constructing the anamorphic SIP signaling, setting the threat dimension of the anamorphic SIP signaling, establishing the detection strategy according to the user requirements, selecting appropriate anamorphic SIP signaling and sending the anamorphic SIP signaling to the IMS according to the detection strategy and the test scheme selected by the user, and detecting the network state of the IMS after receiving the anamorphic SIP signaling, the method and the system realize vulnerability detection of the IMS, and are helpful for improving the safety of the IMS.

Description

technical field [0001] The invention relates to system safety detection technology, in particular to a method and system for detecting leaks of IP multimedia subsystems. Background technique [0002] The IP Multimedia Subsystem (IP Multimedia Subsystem, IMS) is a subsystem supporting IP multimedia services proposed by the 3rd Generation Partnership Project (3GPP) in the Release 5 standard. The core feature of IMS is based on IP packet network, supports open application programming interface (Application Programming Interface, API), uses Session Initial Protocol (Session Initial Protocol, SIP) as the session control protocol, and Session Description Protocol (Session Description Protocol, SDP) ), as a multimedia session description protocol, realizes the mutual separation of business, call control and bearer, and can shield the difference of access means. IMS is an important way to solve the convergence of mobile network and fixed network, and introduce differentiated servic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/26
Inventor 王玉龙苏森双锴徐鹏杨放春于晓燕陈莉莹
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products